Sciweavers

1875 search results - page 254 / 375
» Modeling the Security of Steganographic Systems
Sort
View
DGO
2009
175views Education» more  DGO 2009»
15 years 1 months ago
Modelling task delegation for human-centric eGovernment workflows
The execution of cross-domain eGovernment applications is a challenging topic. eGovernment organisations are facilitated and conducted using workflow management systems. Workflows...
Khaled Gaaloul, François Charoy, Andreas Sc...
134
Voted
CORR
2002
Springer
188views Education» more  CORR 2002»
15 years 9 days ago
GridBank: A Grid Accounting Services Architecture (GASA) for Distributed Systems Sharing and Integration
Computational Grids are emerging as a new infrastructure for Internet-based parallel and distributed computing. They enable the sharing, exchange, discovery, and aggregation of re...
Alexander Barmouta, Rajkumar Buyya
86
Voted
WISTP
2009
Springer
15 years 7 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...
94
Voted
IAJIT
2010
87views more  IAJIT 2010»
14 years 11 months ago
A performance comparison of MD5 authenticated routing traffic with EIGRP, RIPv2, and OSPF
: Routing is the process of forwarding data across an inter-network from a designated source to a final destination. Along the way from source to destination, at least one intermed...
Khalid Abu Al-Saud, Hatim Mohd Tahir, Moutaz Saleh...
ECOOP
2000
Springer
15 years 4 months ago
Ionic Types
Abstract. We are interested in the class of systems for which the satisfaction of code dependencies is a dynamic process rather than one which is determined purely at load-time. Ex...
Simon A. Dobson, Brian Matthews